<?xml version="1.0" encoding="UTF-8"?><rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
><channel><title>Red Tree Communications |</title> <atom:link href="https://www.redtreecommunications.com/category/virus-protection/feed/" rel="self" type="application/rss+xml" /><link>https://www.redtreecommunications.com</link> <description></description> <lastBuildDate>Mon, 16 May 2022 19:18:52 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod> hourly </sy:updatePeriod> <sy:updateFrequency> 1 </sy:updateFrequency> <generator>https://wordpress.org/?v=6.9.1</generator><image> <url>https://www.redtreecommunications.com/wp-content/uploads/2020/12/cropped-redtree-32x32.jpg</url><title>Red Tree Communications |</title><link>https://www.redtreecommunications.com</link> <width>32</width> <height>32</height> </image> <item><title>6 Things You Need to Do to Prevent Getting Hacked</title><link>https://www.redtreecommunications.com/2022/05/10/6-things-you-need-to-do-to-prevent-getting-hacked/</link> <dc:creator><![CDATA[summest]]></dc:creator> <pubDate>Tue, 10 May 2022 16:22:00 +0000</pubDate> <category><![CDATA[Data Privacy]]></category> <category><![CDATA[Virus Protection]]></category> <guid
isPermaLink="false">https://www.redtreecommunications.com/?p=19294</guid><description><![CDATA[THERE ARE TWO&#160;big reasons why people get hacked. Flaws in software and flaws in human behavior. While there’s not much you can do about coding vulnerabilities, you can change&#160;your own behavior and bad habits. Just ask former US president Donald Trump, whose Twitter password was...]]></description> <content:encoded><![CDATA[<div
data-elementor-type="wp-post" data-elementor-id="19294" class="elementor elementor-19294" data-elementor-post-type="post"> <section
class="elementor-section elementor-top-section elementor-element elementor-element-6c89b99 elementor-section-boxed elementor-section-height-default elementor-section-height-default parallax_section_no qode_elementor_container_no" data-id="6c89b99" data-element_type="section"><div
class="elementor-container elementor-column-gap-default"><div
class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3907fa53" data-id="3907fa53" data-element_type="column"><div
class="elementor-widget-wrap elementor-element-populated"><div
class="elementor-element elementor-element-5d24b0ac elementor-widget elementor-widget-text-editor" data-id="5d24b0ac" data-element_type="widget" data-widget_type="text-editor.default"><div
class="elementor-widget-container"><p></p><p>THERE ARE TWO&nbsp;big reasons why people get hacked. Flaws in software and flaws in human behavior. While there’s not much you can do about coding vulnerabilities, you can change&nbsp;<a
href="https://www.wired.com/story/how-to-avoid-worst-online-scams/">your own behavior and bad habits</a>.</p><p></p><p></p><p>Just ask former US president Donald Trump, whose Twitter password was “<a
href="https://www.washingtonpost.com/world/2020/12/17/dutch-trump-twitter-password-hack/" target="_blank" rel="noreferrer noopener">maga2020!</a>” Or Boris Johnson, who revealed details of&nbsp;<a
href="https://metro.co.uk/2020/03/31/boris-johnson-sparks-security-concerns-revealing-zoom-id-cabinet-meeting-12489236/" target="_blank" rel="noreferrer noopener">sensitive Zoom calls</a>&nbsp;at the start of the pandemic in 2020. (These world leaders will have had specific security training from protection agencies too.)</p><p></p><p></p><p>The risks are just as real for the average person—even if the stakes aren’t quite so high. If your accounts aren’t properly protected, your credit card could be compromised or your private messages and photographs stolen and shared for all to see. Working out if your&nbsp;<a
href="https://www.wired.co.uk/article/hacked-accounts-facebook-gmail-netflix">accounts have been hacked</a>&nbsp;is a time-consuming and potentially frustrating process. You’re better off taking some steps to mitigate the risks of getting hacked in the first place. Here’s what you can do to protect yourself.</p><p></p><p></p><p><strong>Use Multi-Factor Authentication</strong></p><p></p><p></p><p>Arguably the most effective thing you can do to protect your online accounts is turning on&nbsp;<a
href="https://www.wired.com/story/protect-accounts-two-factor-authentication/">multi-factor, or two-factor, authentication</a>&nbsp;for as many of your accounts as possible. The method uses a secondary piece of information—often a code generated by an app or sent via SMS—alongside a password.</p><p></p><p></p><p>This secondary piece of information helps to prove it really is you trying to log in, as the codes are often accessed on the phone in your pocket. Even if you do have a password that’s easy to guess (we’ll get to that shortly), an attacker is unlikely to get access to an account with multi-factor authentication turned on unless they have your phone.</p><p></p><p></p><p>There’s a guide to all the accounts that support the method&nbsp;<a
href="https://twofactorauth.org/" target="_blank" rel="noreferrer noopener">here</a>, but in the first instance you should turn it on for all the accounts that hold personal information that could be abused. Like messaging apps such as WhatsApp, social media including Facebook, Instagram, and Twitter, and your email accounts.</p><p></p><p></p><p>Not all forms of multi-factor authentication are equal though. Code-generating apps are considered more secure than&nbsp;<a
href="https://www.wired.com/story/sim-swap-attack-defend-phone/">getting codes via SMS</a>, and beyond that,&nbsp;<a
href="https://www.wired.co.uk/article/best-security-keys">physical security keys</a>&nbsp;provide an even more robust layer of protection.</p><p><strong>Get a Password Manager</strong></p><p></p><p></p><p>Let’s talk about passwords. It’s 2021. You shouldn’t be using “password” or “12345” for any of your passwords—even if it’s a throwaway account.</p><p></p><p></p><p>All the passwords you use for your online accounts should be strong and unique. What this really means is they should be long, include a mixture of different character types, and not be used across multiple websites. Your Twitter password shouldn’t be the same as your online banking one; your home Wi-Fi network shouldn’t use the same credentials as your Amazon account.</p><p></p><p></p><p>The best way to do this is by using a&nbsp;<a
href="https://www.wired.com/story/best-password-managers/">password manager</a>. Password managers create strong passwords for you and store them securely. If the fact that they can stop you getting hacked isn’t enough to make you consider using one, a&nbsp;<a
href="https://www.wired.com/story/coronavirus-quarantine-start-using-password-manager/">password manager</a>&nbsp;also means you never have to struggle to remember a forgotten password again.</p><p></p><p></p><p></p><p></p><p>From our testing of the best password managers out there, we recommend trying out <a
href="https://lastpass.com/" target="_blank" rel="noreferrer noopener">LastPass</a>&nbsp;or&nbsp;<a
href="https://www.keepass.info/" target="_blank" rel="noreferrer noopener">KeePass</a>.Learn How to Spot a Phishing Attack</p><p></p><p></p><p>Quickly clicking can be your worst enemy. When a new email or text message arrives, and it includes something that can be tapped or clicked, our instincts often lead us to do it straight away.&nbsp;<a
href="https://www.wired.com/2017/03/phishing-scams-fool-even-tech-nerds-heres-avoid/">Don’t</a>.</p><p></p><p></p><p>Hackers have used the pandemic as cover to launch wave after wave of&nbsp;<a
href="https://www.wired.com/story/google-state-sponsored-hackers-coronavirus-phishing-malware/">phishing attacks</a>&nbsp;and&nbsp;<a
href="https://www.wired.co.uk/article/google-drive-spam-comments-phishing">dumb Google Drive scams</a>.</p><div
class="GridWrapper-vNBSO jMumET grid grid-margins grid-items-2 ArticlePageChunksGrid-kRgPDq DBpfE grid-layout--adrail narrow wide-adrail"><div
class="GridItem-buSdEM PibmB grid--item grid-layout__content"><div
class="BodyWrapper-ctnerm fJTCQC body body__container article__body" data-journey-hook="client-content" data-testid="BodyWrapper"><div
class="body__inner-container"><p
class="paywall">Anyone can fall for these types of scams. The main thing to do is to think before you click. Scam messages try to trick people into behaving in a way they wouldn’t normally—with, say, pretend instant demands from a boss or messages that say an urgent response is required.</p><p
class="paywall">There’s no foolproof way to identify every type of phishing effort or scam—scammers are constantly upping their game—but being aware of the threat can help reduce its effectiveness.&nbsp;<a
href="https://www.wired.com/story/resist-phishing-attacks/" data-uri="20b19fbeed934d4d949080e2abb4ee0a">Be cautious</a>, think before you click, and download files only from people and sources you know and trust.</p><div
class="paywall heading-h3" role="heading" aria-level="3"><strong>Update Everything</strong></div><div
class="paywall heading-h3" role="heading" aria-level="3"><strong><br></strong></div><p
class="paywall">Every piece of technology you use—from the Facebook app on your phone to the operating system that controls your smart lightbulb—is open to attack. Thankfully, companies are always finding new bugs and fixing them. That’s why it’s crucial you download and update the latest versions of the apps and software you’re using.</p><p
class="paywall">Start with your phone. Navigate to your device settings and find out what operating system you’re using, and update it if you’re not on the latest version (iOS 14 is the latest for iPhones; Android 11 is the latest from Google). For apps and games, Apple’s iOS 13 and above downloads updates automatically, although these settings can be&nbsp;<a
class="external-link" href="https://support.apple.com/en-gb/HT202180" target="_blank" rel="nofollow noopener" data-offer-url="https://support.apple.com/en-gb/HT202180" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://support.apple.com/en-gb/HT202180&quot;}" data-uri="92b2f41840ecd7162f34e114c2140eb4">customized</a>. On Android, auto-updates can also be turned on by visiting the&nbsp;<a
class="external-link" href="https://support.google.com/googleplay/answer/113412?hl=en-GB" target="_blank" rel="nofollow noopener" data-offer-url="https://support.google.com/googleplay/answer/113412?hl=en-GB" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://support.google.com/googleplay/answer/113412?hl=en-GB&quot;}" data-uri="829155155719255c83c0ee6b4dac282e">settings page in the Google Play Store</a>.</p><p
class="paywall">Once you’ve updated your phone, you need to work out what devices to update next. Generally these should be done in order of potential impact. Any laptops and computers you own should be high up the list, and then work back through other connected devices in your life. Remember: Everything is vulnerable, including your&nbsp;<a
class="external-link" href="https://www.bbc.co.uk/news/technology-54436575" target="_blank" rel="nofollow noopener" data-offer-url="https://www.bbc.co.uk/news/technology-54436575" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://www.bbc.co.uk/news/technology-54436575&quot;}" data-uri="859c49306ab7da866c7b219b6bf01eeb">internet-connected chastity belt</a>.</p><div
class="paywall heading-h3" role="heading" aria-level="3"><strong>Encrypt Everything</strong></div><div
class="paywall heading-h3" role="heading" aria-level="3"><strong><br></strong></div><p
class="paywall"><a
href="https://www.wired.com/story/encrypt-all-of-the-things/" data-uri="6fe0c6a19fe87e1ae87cde8cb4aaa542">Protecting your communications</a>&nbsp;has never been easier. Over the last half-decade, companies handling our personal data—including the messages we send and the files we upload to the cloud —have realized that&nbsp;<a
href="https://www.wired.com/story/opinion-encryption-has-never-been-more-essential-or-threatened/" data-uri="7fe9cf277ea6382596ea2768a43095e3">encryption can help them</a>&nbsp;as well as their customers. Using encrypted services means that what you&#8217;re sending is better protected against surveillance and won’t be accessible if your device gets lost or stolen.</p><p
class="paywall">There are two main end-to-end encrypted messaging services,&nbsp;<a
href="https://www.wired.co.uk/article/signal-vs-whatsapp" data-uri="5315e8e6d51470df8d82a956a0bc0801">Signal and WhatsApp</a>. Messages (including photos and videos) plus voice calls and video calls are encrypted by default within both apps. They both also let you use&nbsp;<a
href="https://www.wired.co.uk/article/whatsapp-signal-disappearing-messages" data-uri="7765dd0557a98962eaeab42d41d062ef">disappearing messages</a>, which remove what you’ve sent after a set period of time. The practice can help keep your chats private, even from those that have access to your devices. Our advice is to use Signal where possible, as it collects less metadata than WhatsApp and isn’t owned by Facebook. But if you can’t get your friends to move to Signal, WhatsApp offers a lot more protection than apps that don’t use end-to-end encryption by default.&nbsp;</p></div></div></div><div
class="GridItem-buSdEM gKfJBS grid--item grid-layout__aside"><div
class="StickyBoxWrapper-euhCxU hyXuto sticky-box"><div
class="StickyBoxPrimary-fEgDcn dFVkFO sticky-box__primary"><div
class="RecircMostPopularWrapper-laeRwu btOzvW recirc-most-popular-wrapper viewport-monitor-anchor" data-attr-viewport-monitor="" data-event-boundary="click" data-event-click="{&quot;pattern&quot;:&quot;RecircMostPopular&quot;}" data-include-experiments="true"><div
class="RecircMostPopularContiner-hghWoX czmGGh recirc-most-popular-sparrow-tracking hide-aside-ad" data-most-popular-id="mod-most-popular-2"><div
class="SummaryItemWrapper-gdEuvf jSIQEu summary-item summary-item--has-border summary-item--article summary-item--no-icon summary-item--text-align-left summary-item--layout-placement-side-by-side summary-item--layout-position-image-left summary-item--layout-proportions-33-66 summary-item--side-by-side-align-center summary-item--standard RecircMostPopularSummaryItem-bqCFHs jUGuvc" tabindex="0" role="button" data-event-boundary="click" data-event-click="{&quot;pattern&quot;:&quot;SummaryItem&quot;}" data-in-view="{&quot;pattern&quot;:&quot;SummaryItem&quot;}" data-include-experiments="true"><div
class="SummaryItemContent-gYA-Dbp bHOHql summary-item__content"><div
class="ClampWrapper-bsAiGd gwcaVi clamp SummaryItemHedBase-dZmlME liBqMC summary-item__hed" data-testid="ClampWrapper"><div
class="ClampContent-gtBHJT jblOYM"><div
class="SummaryItemHedTag-fiQrBv fpbMVi" data-testid="SummaryItemHed">&nbsp;</div></div></div></div></div></div></div></div></div></div></div><div
class="GridWrapper-vNBSO jMumET grid grid-margins grid-items-2 ArticlePageChunksGrid-kRgPDq DBpfE grid-layout--adrail narrow wide-adrail"><div
class="GridItem-buSdEM PibmB grid--item grid-layout__content"><div
class="BodyWrapper-ctnerm fJTCQC body body__container article__body" data-journey-hook="client-content" data-testid="BodyWrapper"><div
class="body__inner-container"><p
class="paywall">For your emails, encrypted provider ProtonMail can protect your messages, and there’s also the option to use&nbsp;<a
href="https://www.wired.co.uk/article/gmail-account-alternatives-burner-email" data-uri="2fea414a802fc4d7703f22b11919fcc0">burner email accounts</a>&nbsp;for mailing lists and purchases where you don’t want to hand over your personal data.</p><p
class="paywall">Beyond your messages, encrypting the files on your devices can help reduce the chances of your data being compromised if you’re hacked or lose your devices. Both iPhone and iOS encrypt your hard drive by default. Just make sure you use a strong password or PIN for your devices. A little more effort is needed to encrypt the hard drive on your laptop or computer. Turn on Apple’s&nbsp;<a
class="external-link" href="https://support.apple.com/en-us/HT204837" target="_blank" rel="nofollow noopener" data-offer-url="https://support.apple.com/en-us/HT204837" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://support.apple.com/en-us/HT204837&quot;}" data-uri="a84a9ef28288f039d4eac957c9a5a6e6">FileVault</a>&nbsp;to encrypt your startup disk, and on Windows you can turn encryption on through the&nbsp;<a
class="external-link" href="https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838" target="_blank" rel="nofollow noopener" data-offer-url="https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838&quot;}" data-uri="ae86a8cf9e177fdf90a3f512a0997bf0">Settings menus or use BitLocker encryption</a>.&nbsp;</p><div
class="paywall heading-h3" role="heading" aria-level="3"><strong>Wipe Your Digital Footprint</strong></div><div
class="paywall heading-h3" role="heading" aria-level="3"><strong><br></strong></div><p
class="paywall">The past can come back to haunt you. The old online accounts you no longer use and the login details that belong to them can be weaponized against you if you don’t do anything about them. Hackers frequently use details from previous data breaches to access the accounts people currently use.</p><p
class="paywall">Reducing the amount of information that’s available about your online life can help cut your risk of being hacked. A very simple step is to regularly&nbsp;<a
href="https://www.wired.co.uk/article/how-to-delete-google-search-history-tracking" data-uri="bf9e5b1ddce766565e73844e672b2ead">delete your Google search history</a>, but you can also use&nbsp;<a
href="https://www.wired.co.uk/article/google-alternatives" data-uri="0b37404c74bc2ebad3a38fa0fd96cd14">privacy-first Google alternatives</a>.</p><p
class="paywall">Beyond this, there’s a lot more you can do to reduce your digital footprint. Find the&nbsp;<a
href="https://www.wired.co.uk/article/how-to-delete-old-apps-online-accounts" data-uri="d52fa695652f47e59ed864c96a93cae4">old accounts you no longer use</a>&nbsp;and delete them. It’ll reduce the amount of spam you get and reduce the number of ways hackers can target you. Use&nbsp;<a
class="external-link" href="https://haveibeenpwned.com/" target="_blank" rel="nofollow noopener" data-offer-url="https://haveibeenpwned.com/" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://haveibeenpwned.com/&quot;}" data-uri="b21f00f8105050b4293a7287d73ecb12">Have I Been Pwned?</a>&nbsp;to find your information in old data breaches, use a&nbsp;<a
href="https://www.wired.co.uk/article/best-vpn" data-uri="38b3b41d0058543c4409674c40364e53">VPN</a>&nbsp;to boost browsing privacy, and&nbsp;<a
href="https://www.wired.co.uk/article/what-is-the-dark-web-how-to-access" data-uri="ca9bf6d123620a00890682151ed3d82f">download Tor</a>&nbsp;if you really want to boost your online anonymity.</p><p
class="paywall"><em>This story originally appeared on</em>&nbsp;<a
href="https://www.wired.co.uk/article/how-to-avoid-hacking" data-uri="74169670d78116487e84d57d48dfbeb1"><em>WIRED UK.</em></a></p></div></div></div></div><p></p></div></div></div></div></div> </section></div> ]]></content:encoded> </item> <item><title>How to avoid ransomware attacks at work</title><link>https://www.redtreecommunications.com/2021/07/14/how-to-avoid-ransomware-attacks-at-work/</link> <dc:creator><![CDATA[summest]]></dc:creator> <pubDate>Wed, 14 Jul 2021 14:53:22 +0000</pubDate> <category><![CDATA[Data Privacy]]></category> <category><![CDATA[Networking]]></category> <category><![CDATA[Virus Protection]]></category> <category><![CDATA[Work and Technology]]></category> <guid
isPermaLink="false">https://www.redtreecommunications.com/?p=19160</guid><description><![CDATA[By Tatum Hunter, Washington Post, July 8, 2021&#124; When a security vulnerability at IT software-maker Kaseya led to a ransomware attack that affected 800 to 1,500 businesses, it wasn’t one employee’s fault. But that’s not always the case. Ransomware, which locks down a target’s computers and data,...]]></description> <content:encoded><![CDATA[<p></p></p><p>By <a
href="https://www.washingtonpost.com/people/tatum-hunter/">Tatum Hunter</a>, Washington Post, July 8, 2021|</p><p>When a security vulnerability at IT software-maker Kaseya led to a ransomware attack that affected <a
style="font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight );" href="https://www.washingtonpost.com/business/2021/07/06/kaseya-ransomware-attack-victims/?itid=lk_inline_manual_2">800 to 1,500 businesses</a>, it wasn’t one employee’s fault.</p><p><p></p><p></p></p><p>But that’s not always the case.</p><p><p></p><p></p></p><p>Ransomware, which locks down a target’s computers and data, can infect a network a few different ways, including through employee accounts. Click the wrong link, open the wrong attachment or log into the wrong website, and you could put your company in a perilous position.</p><p><p></p><p></p></p><p>Depending on their roles, some employees find their inboxes flooded with hundreds of phishing emails designed to steal the recipient’s credentials, says Ryan Kalember, executive vice president of cybersecurity strategy at security firm Proofpoint. That requires constant attention, especially as ransomware attacks <a
href="https://www.washingtonpost.com/news/the-switch/wp/2017/05/15/how-to-protect-yourself-from-the-global-ransomware-attack/?itid=lk_inline_manual_6">become more frequent</a> and their demands more intense. The average ransomware payment has nearly tripled so far in 2021 compared to last year, with targets doling out about $850,000, according to <a
href="https://unit42.paloaltonetworks.com/darkside-ransomware/" target="_blank" rel="noreferrer noopener">a report</a> by Palo Alto Networks.</p><p><p></p><p></p></p><p>“If you have a word like ‘accounts’ in your title, you will be attacked more,” Kalember says.</p><p><p></p><p></p></p><p>And that doesn’t mean others should let their guards down. Plenty of firms don’t have the resources to invest in frequent training, software upgrades and security systems — so employees become the first line of defense.</p><p><p></p><p></p></p><p>Luckily, conning people is an ancient art, and <a
href="https://www.washingtonpost.com/business/2021/05/12/ransomware-attack/?itid=lk_inline_manual_11" target="_blank" rel="noreferrer noopener">ransomware</a> groups aren’t breaking new ground. Phishing emails aim for an emotional reaction, says Palo Alto Networks Deputy Director of Threat Intelligence Jen Miller-Osborn. These messages pull busy employees in with promises of money, important company secrets and even cute animals pictures.</p><p><p></p><p></p></p><p>Keep an eye out for these phishing red flags to avoid ransomware and cover your behind.</p><p
data-el="text">Here’s how employers can help individuals guard against phishing and ransomware:</p><p
data-el="text"><strong>Train employees to spot phishing attempts</strong></p><p
data-el="text">Employees need frequent training to keep up with the evolving format and content of phishing emails. <a
href="https://www.usenix.org/system/files/soups2020-reinheimer_0.pdf">One study</a> from a few German universities found employees’ ability to identify phishing attempts drops just six months after their initial training, and that video and interactive training courses are most effective.</p>  <p
data-el="text"><b>Authenticate your corporate email domain.</b></p><p
data-el="text">This blocks the delivery of messages from fraudsters pretending to be a member of your organization. Check with your email service provider, like Microsoft Outlook or Google, to get started. You should also attach warnings to emails coming from external senders or containing links or attachments — both Outlook and Gmail offer this feature.</p><p
data-el="text"><b
style="color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif;">Clarify what employees should do if they click a suspicious link or attachment.</b></p><p
data-el="text">If people are afraid to report or don’t know how, they probably won’t do it. Make sure reporting procedures are outlined in your company’s security policy. Kalember recommended automated reporting, which lets employees report malicious email with the click of a button.</p><p
data-el="text"><b
style="color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif;">Leave room for human error.</b></p><p
data-el="text">Somebody is always going to open the phishing email promising adorable kitten pictures. So consider hedging your bets with anti-phishing technology like remote browsers, in which URLs open not in a traditional browser, but in a special environment in the cloud that disappears as soon as you’re done with it. That way, no matter what the URL contains, it can’t compromise the employee.</p><p
data-el="text"><b
style="color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif;">Conduct ongoing security testing.</b></p><p
data-el="text">Attackers use malicious files and compromised business email accounts to install ransomware on company computers and networks, but software vulnerabilities are another way in. Your company’s IT team — or a third party — should be actively looking for threats on your network.</p><p><p></p>]]></content:encoded> </item> <item><title>What does bitcoin and other cryptocurrency have to do with the rise of ransomware?</title><link>https://www.redtreecommunications.com/2021/02/20/what-does-bitcoin-and-other-cryptocurrency-have-to-do-with-the-rise-of-ransomware/</link> <dc:creator><![CDATA[summest]]></dc:creator> <pubDate>Sat, 20 Feb 2021 17:45:34 +0000</pubDate> <category><![CDATA[Virus Protection]]></category> <guid
isPermaLink="false">https://www.redtreecommunications.com/?p=18854</guid><description><![CDATA[The rise of crypocurrencies like bitcoin has made it easy for cyber criminals to secretly receive payments extorted with this type of malware, without the risk of the authorities being able to identify the perpetrators. The secure, untraceable method of making payments – victims are asked...]]></description> <content:encoded><![CDATA[<div
data-elementor-type="wp-post" data-elementor-id="18854" class="elementor elementor-18854" data-elementor-post-type="post"> <section
class="elementor-section elementor-top-section elementor-element elementor-element-1c054ac9 elementor-section-boxed elementor-section-height-default elementor-section-height-default parallax_section_no qode_elementor_container_no" data-id="1c054ac9" data-element_type="section"><div
class="elementor-container elementor-column-gap-default"><div
class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1bbc588" data-id="1bbc588" data-element_type="column"><div
class="elementor-widget-wrap elementor-element-populated"><div
class="elementor-element elementor-element-2cbac2ec elementor-widget elementor-widget-text-editor" data-id="2cbac2ec" data-element_type="widget" data-widget_type="text-editor.default"><div
class="elementor-widget-container"><p></p><p><a
href="https://www.zdnet.com/article/how-bitcoin-helped-fuel-an-explosion-in-ransomware-attacks/">The rise of crypocurrencies like bitcoin</a> has made it easy for cyber criminals to secretly receive payments extorted with this type of malware, without the risk of the authorities being able to identify the perpetrators.</p><p><img
fetchpriority="high" decoding="async" class="aligncenter wp-image-18862" src="https://www.redtreecommunications.com/wp-content/uploads/2021/02/ransomware1-300x212.jpg?1345a8&amp;1345a8" alt="" width="436" height="309" srcset="https://www.redtreecommunications.com/wp-content/uploads/2021/02/ransomware1-300x212.jpg 300w, https://www.redtreecommunications.com/wp-content/uploads/2021/02/ransomware1-700x495.jpg 700w, https://www.redtreecommunications.com/wp-content/uploads/2021/02/ransomware1.jpg 703w" sizes="(max-width: 436px) 100vw, 436px" /></p><p></p><p></p><p>The secure, untraceable method of making payments – victims are asked to make a payment to a bitcoin address – makes it the perfect currency for criminals who want their financial activities to remain hidden.</p><p></p><p></p><p><a
href="https://www.zdnet.com/article/cybercrime-inc-how-hacking-gangs-are-modeling-themselves-on-big-business/">Cyber-criminal gangs are constantly becoming more professional</a> – many even offer customer service and help for victims who don&#8217;t know how to acquire or send bitcoin, because what&#8217;s the point of making ransom demands if users don&#8217;t know how to pay? Some organisations have even hoarded some of the cryptocurrency in case they get infected or their files are encrypted and have to pay in bitcoin in a hurry.</p><p> </p><p> </p><p> </p><p></p><p></p><p></p></div></div></div></div></div> </section></div> ]]></content:encoded> </item> </channel> </rss>